Bug#929363: enigmail: CVE-2019-12269

2019-06-26 Thread Daniel Kahn Gillmor
On Tue 2019-06-25 22:35:44 +0200, Moritz Mühlenhoff wrote: > Buster still has 2.0.10, what's the plan for it I've just filed https://bugs.debian.org/931126 to unblock for buster. > (and for stretch), should we fix this in older releases? Given that we're updating thunderbird in stable, yes, we s

Bug#929363: enigmail: CVE-2019-12269

2019-06-25 Thread Moritz Mühlenhoff
On Fri, May 24, 2019 at 09:49:54AM +0200, Salvatore Bonaccorso wrote: > Source: enigmail > Source-Version: 2:2.0.11+ds1-1 > > On Wed, May 22, 2019 at 02:25:42PM +0200, Salvatore Bonaccorso wrote: > > Source: enigmail > > Version: 2:2.0.10+ds1-1 > > Severity: important > > Tags: security upstream >

Bug#929363: enigmail: CVE-2019-12269

2019-05-24 Thread Salvatore Bonaccorso
Source: enigmail Source-Version: 2:2.0.11+ds1-1 On Wed, May 22, 2019 at 02:25:42PM +0200, Salvatore Bonaccorso wrote: > Source: enigmail > Version: 2:2.0.10+ds1-1 > Severity: important > Tags: security upstream > Forwarded: https://sourceforge.net/p/enigmail/bugs/983/ > > Hi, > > The following v

Bug#929363: enigmail: CVE-2019-12269

2019-05-22 Thread Salvatore Bonaccorso
Source: enigmail Version: 2:2.0.10+ds1-1 Severity: important Tags: security upstream Forwarded: https://sourceforge.net/p/enigmail/bugs/983/ Hi, The following vulnerability was published for enigmail. CVE-2019-12269[0]: | Enigmail before 2.0.11 allows PGP signature spoofing: for an inline | PGP